The HughesNet Subscriber Agreement is the operating agreement between Hughes Network Systems, LLC (HUGHES) and our HughesNet customers. It outlines the rules and guidelines to which all customers are expected to adhere.

Occasionally, and usually unintentionally, a customer will violate one or more of the terms and conditions of the HughesNet service. HughesNet has a High-Speed Data Security Team that responds to many of the more serious violations. Here are some of the more common abuses and how to handle them:

– Spam
– Hacking
– Threats/Harassment
– Child Pornography

Spam

Spam is generally defined as unsolicited emails that are usually commercial/marketing and "for profit" in nature, although even unsolicited religious and political material can be considered spam. It does not necessarily have to be delivered to thousands or even hundreds of people to be called spam.

Spam that originates from the HughesNet network is in violation of the HughesNet Acceptable Use Policy. If you would like to complain about receiving spam from a hughes.net email address or server, please direct your report to abuse@hughes.net. The information being forwarded MUST include the full headers of the original email along with the full content. This may require you to "cut and paste" this information before forwarding it.

If you are receiving spam from a non-hughes.net source, we can recommend "Spam Cop," a spam reporting service that is available at www.spamcop.net. If the offending email originates from another Internet Service Provider (ISP), not HughesNet, please directly contact the ISP from which the spam originated.

Hacking

Hacking is generally defined as accessing or using another's computer without their knowledge or permission. "Port Scanning" or searching for access to open computers is also a common hacking technique to gain access to a victim's computer.

Customers who believe that they are victims of hacking that originated from the Optimum Online network may contact abuse@hughes.net. The complaint must contain the following:

– Date and time of occurrence (with reference to your local time zone);
– Intruder's IP address;
– Intruder's sending port;
– Victim's IP address and receiving port;
– Type of communication (TCP or UDP);
– Indication of frequency by count or list and type of attack, if applicable.

This information should be sent in text format only (no HTML) and include only one IP address per report. If you are using a firewall software solution, also include the firewall log entry. You should consult with your firewall software manufacturer if you are unsure how to extract this data from your logs.

Threats/Harassment

A communication that threatens harm to a person or place or is intended to persistently torment a person would fall into this category of complaints.

If you wish to report a life-threatening situation, please contact your local law enforcement agency immediately. A follow-up report should also be made to abuse@hughes.net. Any other report of a threat or harassment originating from a HughesNet user should be emailed directly to abuse@hughes.net with all applicable information for security review.

Child Pornography

Hughes takes its commitment to protect children from exploitation over the Internet extremely seriously. Consequently, Hughes is working hand-in-hand with the National Center for Missing and Exploited Children (NCMEC) and other law enforcement agencies on this important project. One of the efforts that Hughes has undertaken in this regard is to establish a specially designated email address, cp-abuse@hughes.net, for complaints about child pornography. Hughes further commits that all complaints received shall be investigated promptly, generally within three (3) business days or less. No Hughes facilities or services may be used by in any fashion for the transmission or dissemination of images containing child pornography.